Cybersecurity awareness starts with identity.
Mansfeld-Südharz, Germany - November 3, 2025
The first workshop was held in a former betting shop between a florist and a bakery, a room that still smelled of cigarette smoke and disappointment. We brought only four items: a stack of blank index cards, a box of coloured pencils, an old-fashioned rubber stamp and a projector that refused to sync with the latest MacBook. By the end of the afternoon, twenty-three retirees had drawn their own “identity crest” on the cards—one blue owl for online banking, one red gate for Facebook, one green key for the tax portal—and could explain in one sentence why re-using the same password was equivalent to installing the same lock on every door of the house. No one had been told what a hash function was; no one needed to. The insight had travelled through coloured pencils instead of PowerPoint, and it stuck longer than any webinar we had ever run.
Identity is the only cyber concept that every citizen already practises in the physical world. We lock doors, we sign letters, we show a driver’s licence at the post office; the mental muscle memory is there, it simply lacks a digital translation layer. The Alliance’s awareness programme therefore begins with a single axiom: if people can visualise their digital selves as a set of distinct artefacts—keys, badges, seals—they will spontaneously apply the same custodial reflexes they use offline. The pedagogical trick is to keep the metaphor consistent across every lesson, so that the word “password” never appears without the word “key”, and the phrase “two-factor” is always paired with “spare key under the flowerpot”. After twelve iterations we discovered that retention peaks when participants handle a physical token that resembles its digital counterpart; hence the rubber stamp. Each attendee receives a wooden handle with their initials reversed, the analogue equivalent of a private key. When we demonstrate how a stamped card verifies authenticity but a photocopy does not, the asymmetric principle becomes tactile, even romantic.
The second insight is that awareness must be granular to the village, not the nation. Anhalt-Bitterfeld contains seventy-one municipalities, and every one has a slightly different threat folklore. In Zerbst, the concern is fake job offers targeting the chemical lay-offs; in Köthen, it is grand-parents buying gift cards for invented grandchildren; in Bitterfeld itself, it is ransomware aimed at the logistics firms that still book freight via Excel. Instead of broadcasting generic advice, we recruit local librarians as “identity stewards”. Librarians already enjoy trust, they keep records, and—crucially—they know who gossips. After a four-hour evening course they are issued a sealed envelope containing twenty NFC tags pre-programmed with the county’s official Wi-Fi certificate and a unique four-word passphrase. When a citizen loses a password, the librarian verifies identity offline—usually by checking the borrowed-book register—then hands over the tag and explains how tapping it to the phone imports the certificate. The interaction lasts three minutes, costs nothing, and leaves the citizen with a story worth repeating at the bakery counter. In the first six months, librarians performed 1,900 such resets, saving an estimated 57,000 € in petrol-station IT support calls, a figure we track only because the county’s consumer-protection office shared its complaint log.
The programme scales vertically, not horizontally. Once a village reaches thirty verified tag users, the Alliance upgrades the local sports-hall router to a sovereign-edition access point that enforces WPA-Enterprise with the same certificate. Users do not notice the change, but attackers do: rogue-AP incidents in the pilot villages dropped to zero within four weeks. The sports hall becomes a “gossip-proof” node where teenagers absorb secure defaults without being taught. When those same teenagers set up Wi-Fi at home, they now ask their parents for a “hall-style password”, creating a bottom-up pressure that no poster campaign ever achieved. Peer pressure is simply identity politics in miniature; we merely replaced the political slogan with a cryptographic default.
"A stamped card in the wallet beats a two-hour webinar in the cloud every time."
Adult education follows the same low-tech ethic. We print a deck of forty playing cards, each card depicting a familiar scenario—online banking, car sharing, grocery delivery—paired with a single yes-or-no question: “Would you give your house key to the delivery driver?” Participants play in pairs; every time the answer is “no”, the card is turned face-down and the player must explain which digital equivalent they would withhold. After twenty minutes the table is littered with face-down cards that visually represent the concept of least privilege without ever using the word. The deck costs 1,80 € to produce and is left behind in the pub so that the game continues after we leave. By now 12,000 decks circulate across the county, and local printers have requested the open-source print files, turning the exercise into a micro-economy that funds the next print run. The metric we care about is not how many people attended a course, but how many decks were re-ordered by villagers we never met.
Identity awareness also infiltrates festivals. During the annual garden-show in Bernburg, visitors are invited to mint a “garden token”: a small wooden coin laser-etched with a random 128-bit string. The coin is theirs to keep, but the string is also hashed and stored in a public ledger run by the county archive. If a visitor ever needs to prove they attended the show—and therefore reside in the region—they can produce the coin, the verifier hashes it again, and a match appears on the ledger. The process is deliberately cumbersome; the point is to make citizens feel the friction of proving identity, so that when a phishing site asks for a one-time code in thirty seconds, the same friction alarm rings. After three hours, 1,400 coins had been minted; 400 people later used them to authenticate when collecting voting credentials for the European Parliament election, a cross-over we had not planned but quietly celebrated.
Workshops end with a voluntary pledge written on the same index card that holds the identity crest. The text is only three sentences long, but it is written by hand, signed and stamped with the wooden private-key seal. Participants keep the card in their wallet, and many discover months later that the mere act of signing slowed them down when about to click a suspicious link. We do not measure clicks averted; we measure how many cards are still carried. Last quarter, 87 % of workshop alumni still had the card on them when stopped during a follow-up survey at the weekly market. That is higher retention than any smartphone authenticator we have tested, and it requires no battery, no update cycle, no privacy policy. The crest and the stamp become a totem that turns abstract identity into something you can feel in your pocket, like the metal of a front-door key.
The long-term ambition is to reach what sociologists call “herd immunity of suspicion”: a population density high enough that scam attempts are recognised and reported before they scale. Epidemiology tells us the threshold is around 70 % for most infectious behaviours; our current modelling suggests we will cross that line in Anhalt-Bitterfeld by late 2027 if the librarian and playing-card vectors maintain their present velocity. No single citizen needs to become a security expert; they only need to recognise when someone is asking for the wrong key. Once that instinct is communal, the attack surface of the entire county shrinks, and the digital identity of every resident becomes—like the wooden stamp—something that cannot be photocopied.
The Cyber Resilience Alliance is a public-private partnership established 2025, led by CypSec, Validato and the County of Mansfeld-Südharz. The Alliance operates a sovereign private-cloud security stack, a shared SOC and an cyber academy, aiming to make Mansfeld-Südharz the reference site for rural cyber resilience by 2030.
Media Contact: Daria Fediay, Chief Executive Officer at CypSec - daria.fediay@cypsec.de.